
Luca Caviglione
Person information
- affiliation: National Research Council, Italy
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j46]Luca Caviglione
, Michal Choras
, Igino Corona, Artur Janicki
, Wojciech Mazurczyk, Marek Pawlicki
, Katarzyna Wasielewska
:
Tight Arms Race: Overview of Current Malware Threats and Trends in Their Detection. IEEE Access 9: 5371-5396 (2021) - [j45]Luca Caviglione
, Mauro Gaggero
:
Multiobjective Placement for Secure and Dependable Smart Industrial Environments. IEEE Trans. Ind. Informatics 17(2): 1298-1306 (2021) - [i7]Andrea Ranieri, Davide Caputo, Luca Verderame, Alessio Merlo, Luca Caviglione:
Deep Adversarial Learning on Google Home devices. CoRR abs/2102.13023 (2021) - 2020
- [j44]Jens Saenger, Wojciech Mazurczyk, Jörg Keller, Luca Caviglione:
VoIP network covert channels to enhance privacy and information sharing. Future Gener. Comput. Syst. 111: 96-106 (2020) - [j43]Davide Caputo
, Luca Verderame
, Andrea Ranieri, Alessio Merlo, Luca Caviglione:
Fine-hearing Google Home: why silence will not protect your privacy. J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 11(1): 35-53 (2020) - [j42]Steffen Wendzel, Luca Caviglione, Alessandro Checco, Aleksandra Mileva, Jean-François Lalande, Wojciech Mazurczyk:
Information Security Methodology, Replication Studies and Information Security Education. J. Univers. Comput. Sci. 26(7): 762-763 (2020) - [j41]Steffen Wendzel
, Cédric Lévy-Bencheton, Luca Caviglione:
Not all areas are equal: analysis of citations in information security research. Scientometrics 122(1): 267-286 (2020) - [c27]Przemyslaw Szary, Wojciech Mazurczyk, Steffen Wendzel, Luca Caviglione:
Design and performance evaluation of reversible network covert channels. ARES 2020: 68:1-68:8 - [c26]Damian Puchalski, Luca Caviglione, Rafal Kozik
, Adrian Marzecki, Slawomir Krawczyk, Michal Choras:
Stegomalware detection through structural analysis of media files. ARES 2020: 73:1-73:6 - [c25]Corinna Heinz, Wojciech Mazurczyk, Luca Caviglione:
Covert Channels in Transport Layer Security. EICC 2020: 6:1-6:6 - [c24]Davide Caputo, Luca Verderame, Alessio Merlo, Andrea Ranieri, Luca Caviglione:
Are you (Google) Home? Detecting Users' Presence through Traffic Analysis of Smart Speakers. ITASEC 2020: 105-118 - [c23]Alessandro Carrega, Luca Caviglione, Matteo Repetto, Marco Zuppelli:
Programmable Data Gathering for Detecting Stegomalware. NetSoft 2020: 422-429
2010 – 2019
- 2019
- [j40]Mauro Gaggero
, Donato Di Paola, Antonio Petitti, Luca Caviglione:
When Time Matters: Predictive Mission Planning in Cyber-Physical Scenarios. IEEE Access 7: 11246-11257 (2019) - [j39]Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel:
Recent Advancements in Digital Forensics, Part 2. IEEE Secur. Priv. 17(1): 7-8 (2019) - [j38]Mauro Gaggero
, Luca Caviglione
:
Model Predictive Control for Energy-Efficient, Quality-Aware, and Secure Virtual Machine Placement. IEEE Trans Autom. Sci. Eng. 16(1): 420-432 (2019) - [c22]Wojciech Mazurczyk, Przemyslaw Szary, Steffen Wendzel, Luca Caviglione:
Towards Reversible Storage Network Covert Channels. ARES 2019: 69:1-69:8 - [c21]Wojciech Mazurczyk, Krystian Powójski, Luca Caviglione:
IPv6 Covert Channels in the Wild. CECC 2019: 10:1-10:6 - 2018
- [j37]Sabine S. Schmidt
, Wojciech Mazurczyk, Radoslaw Kulesza, Jörg Keller, Luca Caviglione
:
Exploiting IP telephony with silence suppression for hidden data transfers. Comput. Secur. 79: 17-32 (2018) - [j36]Manlio Bacco
, Andrea Berton
, Alberto Gotta
, Luca Caviglione
:
IEEE 802.15.4 Air-Ground UAV Communications in Smart Farming Scenarios. IEEE Commun. Lett. 22(9): 1910-1913 (2018) - [j35]Al-Sakib Khan Pathan
, Saiful Azad, Rasib Khan, Luca Caviglione:
Security mechanisms and data access protocols in innovative wireless networks. Int. J. Distributed Sens. Networks 14(9) (2018) - [j34]Krzysztof Cabaj
, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel
, Alan Woodward, Sebastian Zander:
The New Threats of Information Hiding: The Road Ahead. IT Prof. 20(3): 31-39 (2018) - [j33]Luca Caviglione
, Wojciech Mazurczyk, Steffen Wendzel
, Sebastian Zander:
Emerging and Unconventional: New Attacks and Innovative Detection Techniques. Secur. Commun. Networks 2018: 9672523:1 (2018) - [c20]Luca Caviglione, Alessio Merlo, Mauro Migliardi
:
Covert Channels in IoT Deployments Through Data Hiding Techniques. AINA Workshops 2018: 559-563 - [i6]Krzysztof Cabaj, Luca Caviglione, Wojciech Mazurczyk, Steffen Wendzel, Alan Woodward, Sebastian Zander:
The New Threats of Information Hiding: the Road Ahead. CoRR abs/1801.00694 (2018) - 2017
- [j32]Luca Caviglione, Mauro Gaggero
, Enrico Cambiaso
, Maurizio Aiello:
Measuring the Energy Consumption of Cyber Security. IEEE Commun. Mag. 55(7): 58-63 (2017) - [j31]Marcin Urbanski, Wojciech Mazurczyk, Jean-François Lalande, Luca Caviglione:
Detecting local covert channels using process activity correlation on Android smartphones. Comput. Syst. Sci. Eng. 32(2) (2017) - [j30]Wojciech Mazurczyk, Luca Caviglione, Steffen Wendzel
:
Recent Advancements in Digital Forensics. IEEE Secur. Priv. 15(6): 10-11 (2017) - [j29]Luca Caviglione, Steffen Wendzel
, Wojciech Mazurczyk:
The Future of Digital Forensics: Challenges and the Road Ahead. IEEE Secur. Priv. 15(6): 12-17 (2017) - [j28]Andrea Cardaci, Luca Caviglione, Erina Ferro, Alberto Gotta:
Using SPDY to improve Web 2.0 over satellite links. Int. J. Satell. Commun. Netw. 35(4): 307-321 (2017) - [j27]Luca Caviglione, Maciej Podolski, Wojciech Mazurczyk, Massimo Ianigro:
Covert Channels in Personal Cloud Storage Services: The Case of Dropbox. IEEE Trans. Ind. Informatics 13(4): 1921-1931 (2017) - [c19]Sabine S. Schmidt, Wojciech Mazurczyk, Jörg Keller, Luca Caviglione:
A New Data-Hiding Approach for IP Telephony Applications with Silence Suppression. ARES 2017: 83:1-83:6 - 2016
- [j26]Mauro Gaggero
, Luca Caviglione
:
Predictive Control for Energy-Aware Consolidation in Cloud Datacenters. IEEE Trans. Control. Syst. Technol. 24(2): 461-474 (2016) - [j25]Luca Caviglione
, Mauro Gaggero
, Jean-François Lalande
, Wojciech Mazurczyk, Marcin Urbanski:
Seeing the Unseen: Revealing Mobile Malware Hidden Communications via Energy Consumption and Artificial Intelligence. IEEE Trans. Inf. Forensics Secur. 11(4): 799-810 (2016) - [c18]Mauro Gaggero
, Luca Caviglione:
Model predictive control for the placement of virtual machines in cloud computing applications. ACC 2016: 1987-1992 - [c17]Donato Di Paola, Mauro Gaggero
, Antonio Petitti
, Luca Caviglione:
Optimal control of time instants for task replanning in robotic networks. ACC 2016: 1993-1998 - 2015
- [j24]Luca Caviglione
, Wojciech Mazurczyk:
Understanding Information Hiding in iOS. Computer 48(1): 62-65 (2015) - [j23]Wojciech Mazurczyk, Luca Caviglione
:
Steganography in Modern Smartphones and Mitigation Techniques. IEEE Commun. Surv. Tutorials 17(1): 334-357 (2015) - [j22]Luca Caviglione
:
A first look at traffic patterns of Siri. Trans. Emerg. Telecommun. Technol. 26(4): 664-669 (2015) - [j21]Wojciech Mazurczyk, Luca Caviglione
:
Information Hiding as a Challenge for Malware Detection. IEEE Secur. Priv. 13(2): 89-93 (2015) - [j20]Luca Caviglione
, Nedo Celandroni, Matteo Collina, Haitham S. Cruickshank, Gorry Fairhurst
, Erina Ferro, Alberto Gotta, Michele Luglio, Cesare Roseti
, Ahmed Said Abdel Salam
, Raffaello Secchi, Zhili Sun, Alessandro Vanelli-Coralli
:
A deep analysis on future web technologies and protocols over broadband GEO satellite networks. Int. J. Satell. Commun. Netw. 33(5): 451-472 (2015) - [j19]Alessio Merlo
, Mauro Migliardi
, Luca Caviglione
:
A survey on energy-aware security mechanisms. Pervasive Mob. Comput. 24: 77-90 (2015) - [c16]Luca Caviglione
, Jean-François Lalande
, Wojciech Mazurczyk, Steffen Wendzel
:
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. HCI (22) 2015: 165-177 - [i5]Luca Caviglione, Jean-François Lalande, Wojciech Mazurczyk, Steffen Wendzel:
Analysis of Human Awareness of Security and Privacy Threats in Smart Environments. CoRR abs/1502.00868 (2015) - [i4]Wojciech Mazurczyk, Luca Caviglione:
Information Hiding as a Challenge for Malware Detection. CoRR abs/1504.04867 (2015) - 2014
- [j18]Luca Caviglione
, Mauro Coccoli
, Alessio Merlo:
A taxonomy-based model of security and privacy in online social networks. Int. J. Comput. Sci. Eng. 9(4): 325-338 (2014) - [j17]Luca Caviglione, Alberto Gotta:
Characterizing SPDY over High Latency Satellite Channels. EAI Endorsed Trans. Mob. Commun. Appl. 2(5): e3 (2014) - [c15]Mauro Gaggero
, Luca Caviglione
:
A predictive control approach for energy-aware consolidation of virtual machines in cloud computing. CDC 2014: 5308-5313 - [c14]Mauro Migliardi
, Alessio Merlo, Luca Caviglione
:
A Survey of Green, Energy-Aware Security and Some of Its Recent Developments in Networking and Mobile Computing. IMIS 2014: 241-246 - [c13]Steffen Wendzel
, Wojciech Mazurczyk, Luca Caviglione, Michael Meier:
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats. ISSE 2014: 123-133 - [c12]Luca Caviglione, Alberto Gotta, A. Abdel Salam, Michele Luglio, Cesare Roseti
, Francesco Zampognaro:
Performance Evaluation of HTTP and SPDY Over a DVB-RCS Satellite Link with Different BoD Schemes. PSATS 2014: 34-44 - [c11]Manlio Bacco
, Luca Caviglione, Alberto Gotta:
Satellites, UAVs, Vehicles and Sensors for an Integrated Delay Tolerant Ad Hoc Network. PSATS 2014: 114-122 - [c10]Luca Caviglione, Mauro Coccoli, Alberto Grosso:
A Task Allocation Middleware for Wireless Sensor Networks in a Multi-Agent Environment. SENSORNETS 2014: 325-330 - [i3]Steffen Wendzel, Wojciech Mazurczyk, Luca Caviglione, Michael Meier:
Hidden and Uncontrolled - On the Emergence of Network Steganographic Threats. CoRR abs/1407.2029 (2014) - [i2]Wojciech Mazurczyk, Luca Caviglione:
Steganography in Modern Smartphones and Mitigation Techniques. CoRR abs/1410.6796 (2014) - [i1]Luca Caviglione, Wojciech Mazurczyk:
How to covertly leak data from iOS? CoRR abs/1411.3000 (2014) - 2013
- [j16]Luca Caviglione
:
Extending HTTP models to Web 2.0 applications: the case of online social networks. Int. J. Comput. Sci. Eng. 8(3): 210-218 (2013) - [c9]Andrea Cardaci, Luca Caviglione, Alberto Gotta, Nicola Tonellotto:
Performance Evaluation of SPDY over High Latency Satellite Channels. PSATS 2013: 123-134 - 2012
- [j15]Luca Caviglione
, Alessio Merlo:
The energy impact of security mechanisms in modern mobile devices. Netw. Secur. 2012(2): 11-14 (2012) - 2011
- [j14]Luca Caviglione
, Cristiano Cervellera:
Design, optimization and performance evaluation of a content distribution overlay for streaming. Comput. Commun. 34(12): 1497-1509 (2011) - [j13]Luca Caviglione
, Cristiano Cervellera:
An Optimized Content Replication and Distribution Framework for Vehicular Networks. J. Intell. Transp. Syst. 15(4): 179-192 (2011) - [c8]Luca Caviglione
, Alessio Merlo, Mauro Migliardi
:
What is Green Security? IAS 2011: 366-371 - [c7]Luca Caviglione
, Giuseppe Ciaccio, Vittoria Gianuzzi:
Architecture of a communication middleware for VANET applications. Med-Hoc-Net 2011: 111-114 - [c6]Luca Caviglione
, Mauro Coccoli
, Alberto Grosso:
A framework for the delivery of contents in RFID-driven smart environments. RFID-TA 2011: 45-49 - [c5]Alberto Grosso, Mauro Coccoli
, Antonio Boccalatte, Luca Caviglione
:
A task allocation middleware targeting an RFID-enhanced environment. RFID-TA 2011: 313-318 - [c4]Luca Caviglione
:
Extending HTTP Models to Web 2.0 Applications: The Case of Social Networks. UCC 2011: 361-365 - 2010
- [j12]Luca Caviglione
:
A simple neural framework for bandwidth reservation of VoIP communications in cost-effective devices. IEEE Trans. Consumer Electron. 56(3): 1252-1257 (2010)
2000 – 2009
- 2009
- [j11]Cristiano Cervellera, Luca Caviglione
:
Optimization of a peer-to-peer system for efficient content replication. Eur. J. Oper. Res. 196(2): 423-433 (2009) - [j10]Luca Caviglione
:
Enabling cooperation of consumer devices through peer-to-peer overlays. IEEE Trans. Consumer Electron. 55(2): 414-421 (2009) - [j9]Luca Caviglione
, Franco Davoli
:
Using P2P overlays to provide QoS in service-oriented wireless networks. IEEE Wirel. Commun. 16(4): 32-38 (2009) - 2008
- [j8]Luca Caviglione
, Franco Davoli
:
Traffic volume analysis of a nation-wide eMule community. Comput. Commun. 31(10): 2485-2495 (2008) - [j7]Luca Caviglione
, Cristiano Cervellera, Franco Davoli
, Filippo Aldo Grassia:
Optimization of an eMule-like modifier strategy. Comput. Commun. 31(16): 3876-3882 (2008) - 2007
- [j6]Luca Caviglione
, Cristiano Cervellera:
Design of a peer-to-peer system for optimized content replication. Comput. Commun. 30(16): 3107-3116 (2007) - [j5]X. Liang, F. L. C. Ong
, Prashant Pillai
, Pauline M. L. Chan
, Vincenzo Mancuso
, Georgios Koltsidas, Fotini-Niovi Pavlidou, Luca Caviglione
, Erina Ferro, Alberto Gotta
, Haitham S. Cruickshank, Sunil Iyengar, Gorry Fairhurst
:
Fusion of digital television, broadband Internet and mobile communications - Part II: Future service scenarios. Int. J. Satell. Commun. Netw. 25(4): 409-440 (2007) - 2006
- [j4]Luca Caviglione
:
Traffic analysis of an internet online game accessed via a wireless LAN. IEEE Commun. Lett. 10(10): 698-700 (2006) - [j3]Luca Caviglione
:
Introducing emergent technologies in tactical and disaster recovery networks. Int. J. Commun. Syst. 19(9): 1045-1062 (2006) - [c3]Simon Oechsner, Tobias Hoßfeld, Kurt Tutschku
, Frank-Uwe Andersen, Luca Caviglione
:
Using Kademlia for the Configuration of B3G Radio Access Nodes. PerCom Workshops 2006: 141-145 - [c2]Tobias Hoßfeld, Simon Oechsner, Kurt Tutschku
, Frank-Uwe Andersen, Luca Caviglione
:
Supporting Vertical Handover by Using a Pastry Peer-to-Peer Overlay Network. PerCom Workshops 2006: 163-167 - 2005
- [j2]Luca Caviglione, Luca Veltri:
Using SIP as P2P Technology. Afr. J. Inf. Commun. Technol. 1(1) (2005) - [j1]Luca Caviglione
, Franco Davoli
:
Peer-to-peer middleware for bandwidth allocation in sensor networks. IEEE Commun. Lett. 9(3): 285-287 (2005) - [c1]Rafael Asorey-Cacheda
, Francisco J. González-Castaño
, M. Crespo-Alonso, Luca Caviglione
, Franco Davoli
:
A packet snif.ng and synchronization technique to boost P2P satellite networks. HOT-P2P 2005: 28-32
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2021-04-10 23:56 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint